FYI
On Tue, Apr 8, 2014 at 8:25 PM, Moritz Muehlenhoff <[email protected]> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > - ------------------------------------------------------------------------- > Debian Security Advisory DSA-2897-1 [email protected] > http://www.debian.org/security/ Moritz Muehlenhoff > April 08, 2014 http://www.debian.org/security/faq > - ------------------------------------------------------------------------- > > Package : tomcat7 > CVE ID : CVE-2013-2067 CVE-2013-2071 CVE-2013-4286 CVE-2013-4322 > CVE-2014-0050 > > Multiple security issues were found in the Tomcat servlet and JSP engine: > > CVE-2013-2067 > > FORM authentication associates the most recent request requiring > authentication with the current session. By repeatedly sending a > request > for an authenticated resource while the victim is completing the login > form, an attacker could inject a request that would be executed using > the > victim's credentials. > > CVE-2013-2071 > > A runtime exception in AsyncListener.onComplete() prevents the request > from > being recycled. This may expose elements of a previous request to a > current > request. > > CVE-2013-4286 > > Reject requests with multiple content-length headers or with a > content-length > header when chunked encoding is being used. > > CVE-2013-4322 > > When processing a request submitted using the chunked transfer > encoding, > Tomcat ignored but did not limit any extensions that were included. > This allows > a client to perform a limited denial of service. by streaming an > unlimited amount > of data to the server. > > CVE-2014-0050 > > Multipart requests with a malformed Content-Type header could trigger > an > infinite loop causing a denial of service. > > For the stable distribution (wheezy), these problems have been fixed in > version 7.0.28-4+deb7u1. > > For the testing distribution (jessie), these problems have been fixed in > version 7.0.52-1. > > For the unstable distribution (sid), these problems have been fixed in > version 7.0.52-1. > > We recommend that you upgrade your tomcat7 packages. > > Further information about Debian Security Advisories, how to apply > these updates to your system and frequently asked questions can be > found at: http://www.debian.org/security/ > > Mailing list: [email protected] > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQIcBAEBAgAGBQJTRD6+AAoJEBDCk7bDfE42EiwQALiEq9OFVnW5Wf6HP4dWFvpc > OsVvWZweakr5gqXmsQRqxXbDSzFhu3w88ntLhoKjQ5aH785V0hb70msEqxzAH8Hq > idxUug0fjsxD0+YgLSSRnloOxpQC0GpLNBt55/ZFiVFctjlxEbKYOsfcF7HSqm5t > 1ROWW8AyYwnoJq0KSeMwxwKFvZ+x4w5PrvOtqB/yzJYrS+Zom5iDY+eEXh47CePV > J/2FVlff0TyQt3RaRR+c6eqnYRTsLoF22MXS3BXKOJOxcmdBpWjS75pj01FcPsTU > tkOAyYu7e180hnsBDAA4R4w2LdxJOOty87GkucXH2PXBndhkmk0acyGeaBlgW2bM > kKqd0Xp5av4TpgecsAo0/hblwXQ18lNHJB82u/d80/zaWPf6+bAizMsCCHwp8uY7 > 71m2h1doKiuuZe6Dd1Tluq5OzyN0eiwwnFfY3PwYf+TfuH/olw1R99R3/wmMieQ7 > t/EaJZgJFnya2iKrkI/S9di2MVnOijT9lmvp7qaNYSWCS9QRtyy0CWEw45z5884R > QQFl0Or5W+WcWj5cs9FR2mXJ3PRQ5sRGwe6Ng5OYhuct6gZWj9vZhZ/CjxyCG9Fm > UPLWClmWh8V6HPKCovBLM5KK9lLX+KUnadO75+2E30H2UmgZLcj/O/CgFWYpw/N9 > BR/VhLvF6TzVyMJOtk8E > =uwle > -----END PGP SIGNATURE----- > > > -- > To UNSUBSCRIBE, email to [email protected] > with a subject of "unsubscribe". Trouble? Contact > [email protected] > Archive: > https://lists.debian.org/[email protected] > >

